All mobile operators vulnerable to denial of service and fraud through GTP protocol

Based on the findings gathered by Positive Technologies’ experts testing on mobile networks, a new report highlights the cyber security risks to networks that originate with the GTP protocol – which is used to transmit user data and control traffic on 2G, 3G, and 4G networks. Non-standalone 5G networks are also vulnerable.

Read more